US20040268074A1 - Data processing apparatus and memory card - Google Patents

Data processing apparatus and memory card Download PDF

Info

Publication number
US20040268074A1
US20040268074A1 US10/828,239 US82823904A US2004268074A1 US 20040268074 A1 US20040268074 A1 US 20040268074A1 US 82823904 A US82823904 A US 82823904A US 2004268074 A1 US2004268074 A1 US 2004268074A1
Authority
US
United States
Prior art keywords
data
memory card
recording medium
lock
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/828,239
Other versions
US6990026B2 (en
Inventor
Hideki Yagi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Assigned to KABUSHIKI KAISHA TOSHIBA reassignment KABUSHIKI KAISHA TOSHIBA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YAGI, HIDEKI
Publication of US20040268074A1 publication Critical patent/US20040268074A1/en
Application granted granted Critical
Publication of US6990026B2 publication Critical patent/US6990026B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Definitions

  • the present invention relates to a data processing apparatus capable of dealing with a recording medium having a function of controlling secrecy of data and a memory.
  • the security function to protect data has become more important for a memory card used as an input/output device for data processing apparatuses as the storage volume of a memory card has become bigger.
  • An existing security function of this kind is conventionally the data protection function using a password (e.g., Jpn. Pat. Appln. KOHYO Publication No. 8-505964).
  • a memory card having a lock/unlock function comprises a locking unit which locks the memory card; an unlocking unit which unlocks the memory card locked by the locking unit; a memory which stores condition data on which locking or unlocking is performed; and a controller which limits access to recorded data in the memory card by the locking unit or the unlocking unit based on the condition data stored in the memory.
  • FIG. 2 is a flowchart showing the procedure of a data writing processing in the first embodiment
  • FIG. 4 is a flowchart showing the procedure of a data writing processing in a second embodiment of the present invention.
  • FIG. 5 is a flowchart showing the procedure of one example of a data writing processing in the second embodiment
  • FIG. 6 is a flowchart showing the procedure of another example of a data writing processing in the second embodiment
  • FIG. 7 is a flowchart showing the procedure of a data reading processing in the second embodiment
  • FIG. 8 is a flowchart showing the procedure of a start-up processing in a third embodiment of the present invention.
  • FIG. 11 is a flowchart showing the procedure of a start-up processing in a sixth embodiment of the present invention.
  • FIG. 1 is a block diagram showing the configuration of a data processing apparatus in the embodiment of the present invention.
  • the data processing apparatus comprises a CPU 11 , a main memory 12 , a card controller 13 , a card mount 14 , an input/output controller 15 , an input device 16 , a display controller 17 , and a display device 18 .
  • the main memory 12 stores an access-limit application program 121 which realizes a data-secrecy control processing, including a lock/unlock function as shown in FIGS. 2 to 11 .
  • the main memory 12 comprises a registry 122 used for storing condition data and the like in the lock/unlock processing.
  • a recording medium 21 having a data-secrecy-control function at a high access-limit level based on a data encryption processing, authentication processing, and the like is detachably attached to the card mount 14 , and is thus attached to the apparatus main body.
  • An SD (secure digital) memory card as the recording medium 21 is attached directly or via a card adapter to the apparatus main body.
  • the CPU 11 controls the entire system including the units as described above.
  • the processing for controlling data secrecy including a lock/unlock processing as shown in FIGS. 2 to 11 targeted on recording media, are executed according to the access limit application program 121 stored in the main memory 12 .
  • the main memory 12 provides a program storage area for storing various programs including the OS executed by the CPU 11 , and a work area for various data processings.
  • the access limit application program 121 performs a processing for controlling data secrecy, including the lock/unlock processing as shown in FIGS. 2 to 11 described later, and the registory 122 holds condition data and the like used for the lock/unlock processing.
  • the card controller 13 performs data writing/reading control in writing/reading data on/from the SD memory card 21 attached to the card mount 14 under control of the CPU 11 .
  • input/output control in the lock/unlock processing as shown in the figures is carried out in corporation with the authentication/lock/unlock processing unit 212 in the SD memory card, in the processing of the access limit application program 121 executed by the CPU 11 .
  • the card mount 14 has a card slot through which the SD memory card 21 is inserted and pulled out directly or via a card adapter.
  • the SD memory card 21 attached to the card slot is connected to the connector of the apparatus main body.
  • FIG. 2 shows the outline of a data writing processing including a card lock function, in the entire system in the first embodiment.
  • FIG. 3 shows the outline of a data reading processing including a card unlock function, also in the entire system in the first embodiment.
  • FIGS. 2 and 3 each show a processing targeted on an SD memory card 21 having a protected area 213 which has already been set. If no protected area 213 is set in the SD memory card 21 attached to the card mount 14 , the processing of an authentication procedure is omitted.
  • step W 11 it is determined whether the SD card 21 attached to the card mount 14 supports the lock/unlock function or not when data to be protected is written. If the SD memory card 21 does not support the lock/unlock function (No in step W 12 ), a message indicating that writing is performed with no lock is displayed on the display device 18 (step W 21 ). The data to be protected is encrypted (step W 22 ) and written into the SD memory card 21 (step W 23 ). The writing with no lock is the same as the data writing in an existing conventional SD memory card.
  • step W 12 If the SD memory card 21 supports the lock/unlock function (Yes in step W 12 ), presence of a protected area 213 is checked. Then, a predetermined authentication procedure is carried out between the authentication/lock/unlock processing unit 212 in the SD memory card 21 and the access limit application program 121 in the program area, which is executed by the CPU 11 (step W 13 ).
  • step W 14 If the authentication is not successful in the authentication procedure (No in step W 14 ), an error message indicating a failure of writing is displayed on the display device 18 , and the processing ends (step W 24 ).
  • step W 14 If the authentication is completed successfully (Yes in step W 14 ), the data to be protected is encrypted (step W 15 ). Input of a password is then suggested. When a password is input (step W 16 ), the encrypted data is written into the SD memory card 21 (step W 17 ).
  • step W 18 After writing the encrypted data into the SD memory card 21 , the SD memory card 21 is locked with the input password (step W 18 ). If the lock is not successful (No in step W 19 ), the data written into the SD memory card 21 is erased (step W 25 ). A message indicating a failure of locking is displayed and the processing ends (step W 26 ).
  • step W 19 If the lock is completed successfully (Yes in step W 19 ), the data writing with the lock with the password is finished.
  • the password for the lock is recorded on the SD memory card 21 .
  • the function of protecting data recorded on the SD memory card 21 is improved much more. For example, this is because the card itself is locked even if a third party capable of decrypting the encrypted recorded data should obtain the SD memory card 21 .
  • step R 11 In the processing (FIG. 3) of reading data from the SD memory card 21 on which the data writing with a lock has been performed, it is determined whether the SD memory card 21 attached to the card mount 14 supports the lock/unlock function or not (step R 11 ).
  • step R 21 If the SD memory card 21 does not support the lock/unlock function (No in step R 12 ), a message indicative of data reading without a lock is displayed on the display device 18 (step R 21 ), and it is determined that a protected area 213 is present. Then, a predetermined authentication procedure is carried out between the authentication/lock/unlock processing unit 212 in the SD memory card 21 and the access limit application program 121 executed by the CPU 11 (step R 22 ).
  • step R 23 If the authentication is not successful in the authentication procedure (No in step R 23 ), an error message indicating a failure of reading is displayed on the display device 18 , and the processing ends (step R 26 ). If the authentication is completed successfully (Yes in step R 23 ), the encrypted data with no lock is read from the SD memory card 21 (step R 24 ). Input of a password is then suggested. If the data cannot be read successfully (No in step R 25 ), an error message indicating a failure of reading is displayed on the display device 18 and the processing ends (step R 26 ). If the data is read successfully (Yes in step R 25 ), the reading of data with no lock ends.
  • step R 12 If the SD memory card 21 supports the lock/unlock function (Yes in step R 12 ), input of a password for indicating an accessing person is then suggested.
  • step R 13 When a password is input (step R 13 ), the validity of the input password is checked, and the SD memory card 21 is unlocked (step R 14 ). To confirm the validity of the input password at this time, a password used for locking the card is read from a predetermined area of the SD memory card 21 , and is compared with the input password.
  • step R 15 If the unlocking is not successful (No in step R 15 ), an error message indicating a failure of reading is displayed on the display device 18 , and the processing ends (step R 26 ). If the unlocking is completed successfully (Yes in step R 15 ), presence of the protected area 213 is checked, and a predetermined authentication procedure is carried out between the authentication/lock/unlock processing unit 212 in the SD memory card 21 and the access limit application program 121 in the program area, which is executed by the CPU 11 (step R 16 ).
  • the memory card has the lock/unlock function as described above, a higher-level multiple data protection is possible in addition to the authentication and the encryption even in a situation that encrypted data can be decrypted.
  • the data-secrecy-control function is improved much more.
  • FIG. 4 shows a data writing processing of the access limit application program 121 according to a second embodiment.
  • FIG. 7 shows a data reading processing thereof.
  • step W 31 it is determined whether the SD card 21 attached to the card mount 14 supports the lock/unlock function or not when data to be protected is written. If the SD memory card 21 does not support the lock/unlock function (No in step W 31 ), a message indicating that cards supporting no lock/unlock function cannot be treated is displayed on the display device 18 (step W 36 ), and the processing ends.
  • step W 31 If the SD memory card 21 supports the lock/unlock function (Yes in step W 31 ), it is subsequently determined whether the SD memory card 21 is locked or not (step W 32 ).
  • step W 32 If the SD memory card 21 is not locked (No in step W 32 ), input of a password is suggested. When a password is then input (step W 33 ), data is written into the SD memory card 21 (step W 34 ). Further, the SD memory card 21 is locked with the input password, and the writing processing ends (step W 35 ).
  • step W 32 If the SD memory card 21 is locked (Yes in step W 32 ), a message indicating that the memory card 21 is locked is displayed on the display device 18 (step W 41 ), and further, input of a password is suggested. When a password is then input (step W 42 ), the validity of the input password is checked, and unlocking of the SD memory card 21 is suggested (step W 43 ).
  • step W 44 If the unlocking is not successful (No in step W 44 ), an error message indicating a failure of unlocking is displayed on the display device 18 , and the processing ends (step W 45 ).
  • step W 44 If the unlocking is completed successfully (Yes in step W 44 ), input of a password is suggested. When a password is then input (step W 33 ), data is written into the SD memory card 21 (step W 34 ), and the SD memory card 21 is locked with the input password. Then, the processing ends (step W 35 ).
  • step W 34 data is actually written into the SD memory card 21 .
  • the processings differ depending on whether the data is written into the normal data storage area 214 or the protected area 213 .
  • FIG. 5 shows the processing of writing data into the normal data storage area 214 at this time.
  • FIG. 6 shows the other processing of writing data into the protected area 213 .
  • step W 51 the data to be written is encrypted.
  • the encrypted data is written into the data storage area 214 in the SD memory card 21 , and the processing ends (step W 52 ).
  • step W 61 a predetermined authentication procedure is carried out with the authentication/lock/unlock processing unit 212 in the SD memory card 21 (step W 61 ). If the authentication is not successful (No in step W 62 ), an error message indicating a failure of writing is displayed on the display device 18 , and the processing ends (step W 65 ).
  • step W 62 If the authentication is completed successfully (Yes in step W 62 ), the data to be protected is encrypted (step W 63 ), and the encrypted data is written into the protected area 213 in the SD memory card 21 (step W 64 ).
  • step R 31 If the SD memory card 21 supports the lock/unlock function (Yes in step R 31 ), it is determined whether the SD memory card 21 is locked or not (step R 32 ).
  • step R 32 If the SD memory card 21 is locked (Yes in step R 32 ), input of a password for releasing the lock is then suggested. When a password is input (step R 33 ), the SD memory card 21 is unlocked with the key (step R 34 ).
  • step R 35 If the unlocking is not successful (No in step R 35 ), an error message indicating a failure of unlocking is displayed on the display device 18 , and the processing ends (step R 36 ).
  • step R 36 the processing of reading data from the normal data storage area 214 and the processing of reading data from the protected area 213 are different from each other like in the data writing processing.
  • An authentication procedure is performed in the data reading processing from the protected area 213 , like in the case of the writing processing to the protected area 213 described previously.
  • step W 31 if the SD memory card 21 does not support the lock/unlock function in the wiring processing into the SD memory card 21 (No in step W 31 ), a message indicating that cards which do not support the lock/unlock function cannot be handled is displayed on the display device 18 (step W 36 ), and the writing processing ends.
  • data writing with no lock may be enabled like in the first embodiment described previously.
  • a third embodiment which realizes a much higher data-secrecy-control function, using the lock/unlock function described above.
  • a password is obtained through a predetermined procedure with respect to data recorded on the SD memory card 21 .
  • the data recorded on the SD memory card 21 can be used for a predetermined limited period.
  • the third embodiment will now be described with reference to FIGS. 1, 7, and 8 .
  • data indicative of a preset control-expiration limit is obtained as the access limit application program 121 starts up. Further, data indicative of the current date/time is obtained (step S 12 ). Both of these data items are compared with each other to determine whether the current date/time is over the preset control-expiration limit or not (step S 13 ).
  • the data indicative of the control-expiration limit is encrypted and set in advance, for example, in the registry 122 of the main memory 12 . This data is read from the registry 122 at the time of start-up, and is obtained by performing a decryption processing.
  • the current date/time data is obtained from a clock module (RTC) operating in the apparatus main body via the OS (Operating System).
  • step S 13 If the current date/time is after the preset control-expiration limit, i.e., over the control-expiration limit (No in step S 13 ), an error message indicating that the expiration limit is over is displayed on the display device 18 (step S 15 ).
  • the access limit application program 121 is taken as causing a start-up error, and the access to the SD memory card 21 is made invalid.
  • step S 13 If the current date/time is not after the preset control-expiration limit, i.e., within the control-expiration limit (Yes in step S 13 ), the SD memory card 21 is locked (step S 14 ), and the processing is continued.
  • data recorded on the SD memory card 21 can be used by unlocking the SD memory card 21 with a password (see steps R 33 to R 36 in FIG. 7).
  • a fourth embodiment of the present invention which uses the lock/unlock function described above.
  • a password is obtained through a predetermined procedure with respect to data recorded on the SD memory card 21 .
  • the data recorded on the SD memory card 21 can be used up to a predetermined preset number of times.
  • the fourth embodiment will be described with reference to FIGS. 1, 7, and 9 .
  • data indicative of a preset maximum number of starts the program can be started up is obtained as the access limit application program 121 starts up (step S 21 in FIG. 9). Further, data indicative of another number of starts, i.e., how many times the program 121 has been started up till the current start-up is obtained (step S 22 ). Both of these data items are compared with each other to determine whether the number of starts the program 121 has been started up till the current start-up exceeds the preset maximum number of starts or not (step S 23 ).
  • the data indicative of the maximum number of starts is encrypted and set in advance, for example, in the registry 122 of the main memory 12 .
  • This data is read from the registry 122 at the time of start-up, and is obtained by performing a decryption processing.
  • the other data indicative of the number of times the program 121 has been started up till the current start-up can be obtained, for example, by using a particular area of the registry 122 as a start number counter and by incrementing the content of the counter for every start-up of the application.
  • the contents (count value) i.e., of the number of starts may be encrypted and held in the start number counter.
  • step S 23 If the number of starts till the current start-up exceeds the preset maximum number of starts (Yes in step S 23 ), an error message thereof is displayed on the display device 18 (step S 26 ). Then, the access limit application program 121 is taken as causing a start-up error, and the access to the SD memory card 21 is made invalid.
  • step S 23 If the number of starts till the current start-up does not exceed the preset maximum number of starts (No in step S 23 ), the number of start till the current start-up is updated (+1) (step S 24 ). Then, the SD memory card 21 is locked (step S 25 ), and the start-up processing continues.
  • step S 31 data indicative of a preset control-expiration limit is obtained as the access limit application program 121 starts up. Further, data indicative of the current date/time is obtained (step S 32 ). Both of these data items are compared with each other to determine whether the current date/time is over the preset control-expiration limit or not (step S 33 ).
  • step S 33 An example of obtaining each data item at this time has already been described in the third embodiment, and therefore, explanation of the example will be omitted.
  • step S 33 If the current date/time is not over the preset control-expiration limit, i.e., within the control-expiration limit (No in step S 33 ), the start-up processing is continued. If the current date/time is over the preset control-expiration limit, i.e., the control-expiration limit has expired (Yes in step S 33 ), the SD memory card 21 is locked (step S 34 ), and an error message thereof is displayed on the display device 18 (step S 35 ). The access to the SD memory card 21 is then made invalid.
  • use of the data recorded on the SD memory card 21 is allowed up to a predetermined preset number of times.
  • the sixth embodiment will be described with reference to FIGS. 1 and 11 .
  • data indicative of a preset maximum number of allowable starts is obtained as the access limit application program 121 starts up (step S 41 in FIG. 11). Further, data indicative of another number of starts, i.e., how many times the program 121 has been started up till the current start-up is obtained (step S 42 ). Both of these data items are compared with each other to determine whether the number of starts till the current start-up exceeds the preset maximum number of allowable starts or not (step S 43 ).
  • An example of obtaining each data item at this time has already been described in the fourth embodiment, and therefore, explanation of the example will be omitted.
  • step S 43 If the number of starts till the current start-up exceeds the preset maximum number of allowable starts (Yes in step S 43 ), the SD memory card 21 is locked (step S 45 ), and an error message indicating that the preset maximum number is exceeded is displayed on the display device 18 (step S 46 ). Then, the access to the SD memory card 21 is made invalid.
  • step S 44 If the number of starts till the current start-up does not exceed the preset maximum number of allowable starts, the number of starts till the current start-up is updated (+1) (step S 44 ), and the start-up processing continues.

Abstract

A CPU locks a memory card attached to a card mount with a password by a lock/unlock processing according to an access limit application program, and unlocks the lock based on a predetermined condition. The function to control the secrecy of data recorded on the card is thus improved.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is based upon and claims the benefit of priority from prior Japanese Patent Application No. 2003-120093, filed Apr. 24, 2003, the entire contents of which are incorporated herein by reference. [0001]
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0002]
  • The present invention relates to a data processing apparatus capable of dealing with a recording medium having a function of controlling secrecy of data and a memory. [0003]
  • 2. Description of the Related Art [0004]
  • The security function to protect data has become more important for a memory card used as an input/output device for data processing apparatuses as the storage volume of a memory card has become bigger. An existing security function of this kind is conventionally the data protection function using a password (e.g., Jpn. Pat. Appln. KOHYO Publication No. 8-505964). [0005]
  • However, this data protection function based on a password achieves only a low access-limit level, and therefore cannot cope with high multimedia technologies. [0006]
  • BRIEF SUMMARY OF THE INVENTION
  • The present invention is directed to substantially obviate one or more of the problems due to limitations and disadvantages of the related art. [0007]
  • According to an embodiment of the present invention, a data processing apparatus comprises a mount to which a recording medium having a lock/unlock function is attached; a determination unit which determines whether the recording medium attached to the mount has the lock/unlock function; a locking unit which locks the recording medium to protect data recorded on the recording medium; and an unlocking unit which unlocks the recording medium locked by the locking unit based on a predetermined condition. [0008]
  • According to another embodiment of the present invention, a memory card having a lock/unlock function, comprises a locking unit which locks the memory card; an unlocking unit which unlocks the memory card locked by the locking unit; a memory which stores condition data on which locking or unlocking is performed; and a controller which limits access to recorded data in the memory card by the locking unit or the unlocking unit based on the condition data stored in the memory. [0009]
  • Additional objects and advantages of the present invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the present invention. [0010]
  • The objects and advantages of the present invention may be realized and obtained by means of the instrumentalities and combinations particularly pointed out hereinafter.[0011]
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING
  • The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the present invention and, together with the general description given above and the detailed description of the embodiments given below, serve to explain the principles of the present invention in which: [0012]
  • FIG. 1 is a block diagram showing the configuration of a main part of a first embodiment of the present invention; [0013]
  • FIG. 2 is a flowchart showing the procedure of a data writing processing in the first embodiment; [0014]
  • FIG. 3 is a flowchart showing the procedure of a data reading processing in the first embodiment; [0015]
  • FIG. 4 is a flowchart showing the procedure of a data writing processing in a second embodiment of the present invention; [0016]
  • FIG. 5 is a flowchart showing the procedure of one example of a data writing processing in the second embodiment; [0017]
  • FIG. 6 is a flowchart showing the procedure of another example of a data writing processing in the second embodiment; [0018]
  • FIG. 7 is a flowchart showing the procedure of a data reading processing in the second embodiment; [0019]
  • FIG. 8 is a flowchart showing the procedure of a start-up processing in a third embodiment of the present invention; [0020]
  • FIG. 9 is a flowchart showing the procedure of a start-up processing in a fourth embodiment of the present invention; [0021]
  • FIG. 10 is a flowchart showing the procedure of a start-up processing in a fifth embodiment of the present invention; and [0022]
  • FIG. 11 is a flowchart showing the procedure of a start-up processing in a sixth embodiment of the present invention.[0023]
  • DETAILED DESCRIPTION OF THE INVENTION
  • An embodiment of a data processing apparatus according to the present invention will now be described with reference to the accompanying drawings. [0024]
  • FIG. 1 is a block diagram showing the configuration of a data processing apparatus in the embodiment of the present invention. [0025]
  • As shown in FIG. 1, the data processing apparatus according to the embodiment of the present invention comprises a [0026] CPU 11, a main memory 12, a card controller 13, a card mount 14, an input/output controller 15, an input device 16, a display controller 17, and a display device 18. The main memory 12 stores an access-limit application program 121 which realizes a data-secrecy control processing, including a lock/unlock function as shown in FIGS. 2 to 11. The main memory 12 comprises a registry 122 used for storing condition data and the like in the lock/unlock processing. A recording medium 21 having a data-secrecy-control function at a high access-limit level based on a data encryption processing, authentication processing, and the like is detachably attached to the card mount 14, and is thus attached to the apparatus main body. An SD (secure digital) memory card as the recording medium 21 is attached directly or via a card adapter to the apparatus main body.
  • The [0027] SD memory card 21 attached to the card mount 14 includes an interface (I/F) unit 211, an authentication/lock/unlock processing unit 212, a protected-data storage area (protected area) 213, and a normal-data storage area 214 which is not protected. The interface unit 211 includes a circuit which controls an interface to the host's side (the apparatus main body), and performs input/output control to access (read/write) data with respect to the apparatus main body. The authentication/lock/unlock processing unit 212 is realized by a microprocessor and firmware (F/W) to perform a predetermined authentication procedure and a lock/unlock processing. The protected area 213 is a data storage area which is accessible only when the authentication procedure is successful. The data storage area 214 is a data storage area which is accessible without involving the authentication procedure.
  • The [0028] CPU 11 controls the entire system including the units as described above. In this embodiment, the processing for controlling data secrecy, including a lock/unlock processing as shown in FIGS. 2 to 11 targeted on recording media, are executed according to the access limit application program 121 stored in the main memory 12. The main memory 12 provides a program storage area for storing various programs including the OS executed by the CPU 11, and a work area for various data processings. In the present embodiment, the access limit application program 121 performs a processing for controlling data secrecy, including the lock/unlock processing as shown in FIGS. 2 to 11 described later, and the registory 122 holds condition data and the like used for the lock/unlock processing.
  • The [0029] card controller 13 performs data writing/reading control in writing/reading data on/from the SD memory card 21 attached to the card mount 14 under control of the CPU 11. In this embodiment, input/output control in the lock/unlock processing as shown in the figures is carried out in corporation with the authentication/lock/unlock processing unit 212 in the SD memory card, in the processing of the access limit application program 121 executed by the CPU 11. The card mount 14 has a card slot through which the SD memory card 21 is inserted and pulled out directly or via a card adapter. The SD memory card 21 attached to the card slot is connected to the connector of the apparatus main body.
  • The [0030] input device 16 connected to the input/output controller 15 comprises, for example, a keyboard, a pointing device, or the like. In this embodiment, the input device 16 is used to input a password to lock/unlock the SD memory card 21.
  • FIG. 2 shows the outline of a data writing processing including a card lock function, in the entire system in the first embodiment. FIG. 3 shows the outline of a data reading processing including a card unlock function, also in the entire system in the first embodiment. FIGS. 2 and 3 each show a processing targeted on an [0031] SD memory card 21 having a protected area 213 which has already been set. If no protected area 213 is set in the SD memory card 21 attached to the card mount 14, the processing of an authentication procedure is omitted.
  • In the data writing processing of FIG. 2, it is determined whether the [0032] SD card 21 attached to the card mount 14 supports the lock/unlock function or not when data to be protected is written (step W11). If the SD memory card 21 does not support the lock/unlock function (No in step W12), a message indicating that writing is performed with no lock is displayed on the display device 18 (step W21). The data to be protected is encrypted (step W22) and written into the SD memory card 21 (step W23). The writing with no lock is the same as the data writing in an existing conventional SD memory card.
  • If the [0033] SD memory card 21 supports the lock/unlock function (Yes in step W12), presence of a protected area 213 is checked. Then, a predetermined authentication procedure is carried out between the authentication/lock/unlock processing unit 212 in the SD memory card 21 and the access limit application program 121 in the program area, which is executed by the CPU 11 (step W13).
  • If the authentication is not successful in the authentication procedure (No in step W[0034] 14), an error message indicating a failure of writing is displayed on the display device 18, and the processing ends (step W24).
  • If the authentication is completed successfully (Yes in step W[0035] 14), the data to be protected is encrypted (step W15). Input of a password is then suggested. When a password is input (step W16), the encrypted data is written into the SD memory card 21 (step W17).
  • After writing the encrypted data into the [0036] SD memory card 21, the SD memory card 21 is locked with the input password (step W18). If the lock is not successful (No in step W19), the data written into the SD memory card 21 is erased (step W25). A message indicating a failure of locking is displayed and the processing ends (step W26).
  • If the lock is completed successfully (Yes in step W[0037] 19), the data writing with the lock with the password is finished. The password for the lock is recorded on the SD memory card 21. As a result, the function of protecting data recorded on the SD memory card 21 is improved much more. For example, this is because the card itself is locked even if a third party capable of decrypting the encrypted recorded data should obtain the SD memory card 21.
  • In the processing (FIG. 3) of reading data from the [0038] SD memory card 21 on which the data writing with a lock has been performed, it is determined whether the SD memory card 21 attached to the card mount 14 supports the lock/unlock function or not (step R11).
  • If the [0039] SD memory card 21 does not support the lock/unlock function (No in step R12), a message indicative of data reading without a lock is displayed on the display device 18 (step R21), and it is determined that a protected area 213 is present. Then, a predetermined authentication procedure is carried out between the authentication/lock/unlock processing unit 212 in the SD memory card 21 and the access limit application program 121 executed by the CPU 11 (step R22).
  • If the authentication is not successful in the authentication procedure (No in step R[0040] 23), an error message indicating a failure of reading is displayed on the display device 18, and the processing ends (step R26). If the authentication is completed successfully (Yes in step R23), the encrypted data with no lock is read from the SD memory card 21 (step R24). Input of a password is then suggested. If the data cannot be read successfully (No in step R25), an error message indicating a failure of reading is displayed on the display device 18 and the processing ends (step R26). If the data is read successfully (Yes in step R25), the reading of data with no lock ends.
  • If the [0041] SD memory card 21 supports the lock/unlock function (Yes in step R12), input of a password for indicating an accessing person is then suggested. When a password is input (step R13), the validity of the input password is checked, and the SD memory card 21 is unlocked (step R14). To confirm the validity of the input password at this time, a password used for locking the card is read from a predetermined area of the SD memory card 21, and is compared with the input password.
  • If the unlocking is not successful (No in step R[0042] 15), an error message indicating a failure of reading is displayed on the display device 18, and the processing ends (step R26). If the unlocking is completed successfully (Yes in step R15), presence of the protected area 213 is checked, and a predetermined authentication procedure is carried out between the authentication/lock/unlock processing unit 212 in the SD memory card 21 and the access limit application program 121 in the program area, which is executed by the CPU 11 (step R16).
  • If the authentication is not successful in the authentication procedure (No in step R[0043] 17), an error message indicating a failure of reading is displayed on the display device 18, and the processing ends (step R26). If the authentication is completed successfully (Yes in step R17), the encrypted data with a lock is read from the SD memory card 21, and the processing ends (step R18).
  • Since the memory card has the lock/unlock function as described above, a higher-level multiple data protection is possible in addition to the authentication and the encryption even in a situation that encrypted data can be decrypted. The data-secrecy-control function is improved much more. [0044]
  • Other embodiments of the data processing apparatus according to the present invention will be described. The same portions as those of the first embodiment will be indicated in the same reference numerals and their detailed description will be omitted. [0045]
  • FIG. 4 shows a data writing processing of the access [0046] limit application program 121 according to a second embodiment. FIG. 7 shows a data reading processing thereof.
  • In the data writing processing of FIG. 4, it is determined whether the [0047] SD card 21 attached to the card mount 14 supports the lock/unlock function or not when data to be protected is written (step W31). If the SD memory card 21 does not support the lock/unlock function (No in step W31), a message indicating that cards supporting no lock/unlock function cannot be treated is displayed on the display device 18 (step W36), and the processing ends.
  • If the [0048] SD memory card 21 supports the lock/unlock function (Yes in step W31), it is subsequently determined whether the SD memory card 21 is locked or not (step W32).
  • If the [0049] SD memory card 21 is not locked (No in step W32), input of a password is suggested. When a password is then input (step W33), data is written into the SD memory card 21 (step W34). Further, the SD memory card 21 is locked with the input password, and the writing processing ends (step W35).
  • If the [0050] SD memory card 21 is locked (Yes in step W32), a message indicating that the memory card 21 is locked is displayed on the display device 18 (step W41), and further, input of a password is suggested. When a password is then input (step W42), the validity of the input password is checked, and unlocking of the SD memory card 21 is suggested (step W43).
  • If the unlocking is not successful (No in step W[0051] 44), an error message indicating a failure of unlocking is displayed on the display device 18, and the processing ends (step W45).
  • If the unlocking is completed successfully (Yes in step W[0052] 44), input of a password is suggested. When a password is then input (step W33), data is written into the SD memory card 21 (step W34), and the SD memory card 21 is locked with the input password. Then, the processing ends (step W35).
  • In the above described data writing processing into the SD memory card [0053] 21 (step W34), data is actually written into the SD memory card 21. The processings differ depending on whether the data is written into the normal data storage area 214 or the protected area 213. FIG. 5 shows the processing of writing data into the normal data storage area 214 at this time. FIG. 6 shows the other processing of writing data into the protected area 213.
  • In case of writing data into normal [0054] data storage area 214 as shown in FIG. 5, the data to be written is encrypted (step W51). The encrypted data is written into the data storage area 214 in the SD memory card 21, and the processing ends (step W52).
  • In the processing (FIG. 6) of writing data into the protected [0055] area 213, a predetermined authentication procedure is carried out with the authentication/lock/unlock processing unit 212 in the SD memory card 21 (step W61). If the authentication is not successful (No in step W62), an error message indicating a failure of writing is displayed on the display device 18, and the processing ends (step W65).
  • If the authentication is completed successfully (Yes in step W[0056] 62), the data to be protected is encrypted (step W63), and the encrypted data is written into the protected area 213 in the SD memory card 21 (step W64).
  • In the data reading processing of FIG. 7, it is determined whether the [0057] SD memory card 21 attached to the card mount 14 supports the lock/unlock function or not (step R31). If the SD memory card 21 does not support the lock/unlock function (No in step R31), a message indicating that the memory card 21 does not support the lock/unlock function is displayed on the display device 18 (step R37). Then, the reading processing is performed on the SD memory card 21 (step R36), and the processing ends.
  • If the [0058] SD memory card 21 supports the lock/unlock function (Yes in step R31), it is determined whether the SD memory card 21 is locked or not (step R32).
  • If the [0059] SD memory card 21 is not locked (No in step R32), the reading processing is executed on the SD memory card 21 (step R36), and the processing ends.
  • If the [0060] SD memory card 21 is locked (Yes in step R32), input of a password for releasing the lock is then suggested. When a password is input (step R33), the SD memory card 21 is unlocked with the key (step R34).
  • If the unlocking is not successful (No in step R[0061] 35), an error message indicating a failure of unlocking is displayed on the display device 18, and the processing ends (step R36).
  • In the above-described data reading processing from the SD memory card [0062] 21 (step R36), the processing of reading data from the normal data storage area 214 and the processing of reading data from the protected area 213 are different from each other like in the data writing processing. An authentication procedure is performed in the data reading processing from the protected area 213, like in the case of the writing processing to the protected area 213 described previously.
  • Thus, once the [0063] SD memory card 21 is locked, data cannot be read from the SD memory card 21 before the SD memory card 21 is unlocked with the same password used to lock the card. As a result, the secrecy of data recorded on the SD memory card 21 is improved much more.
  • In the second embodiment described above, if the [0064] SD memory card 21 does not support the lock/unlock function in the wiring processing into the SD memory card 21 (No in step W31), a message indicating that cards which do not support the lock/unlock function cannot be handled is displayed on the display device 18 (step W36), and the writing processing ends. However, as indicated by broken lines in FIG. 4, data writing with no lock may be enabled like in the first embodiment described previously.
  • Described next will be a third embodiment which realizes a much higher data-secrecy-control function, using the lock/unlock function described above. In the third embodiment, a password is obtained through a predetermined procedure with respect to data recorded on the [0065] SD memory card 21. With use of the password, the data recorded on the SD memory card 21 can be used for a predetermined limited period. The third embodiment will now be described with reference to FIGS. 1, 7, and 8.
  • In the third embodiment, data indicative of a preset control-expiration limit (step S[0066] 11 in FIG. 8) is obtained as the access limit application program 121 starts up. Further, data indicative of the current date/time is obtained (step S12). Both of these data items are compared with each other to determine whether the current date/time is over the preset control-expiration limit or not (step S13). The data indicative of the control-expiration limit is encrypted and set in advance, for example, in the registry 122 of the main memory 12. This data is read from the registry 122 at the time of start-up, and is obtained by performing a decryption processing. The current date/time data is obtained from a clock module (RTC) operating in the apparatus main body via the OS (Operating System).
  • If the current date/time is after the preset control-expiration limit, i.e., over the control-expiration limit (No in step S[0067] 13), an error message indicating that the expiration limit is over is displayed on the display device 18 (step S15). The access limit application program 121 is taken as causing a start-up error, and the access to the SD memory card 21 is made invalid.
  • If the current date/time is not after the preset control-expiration limit, i.e., within the control-expiration limit (Yes in step S[0068] 13), the SD memory card 21 is locked (step S14), and the processing is continued.
  • With respect to the locked [0069] SD memory card 21, data recorded on the SD memory card 21 can be used by unlocking the SD memory card 21 with a password (see steps R33 to R36 in FIG. 7).
  • By using this function, various data services such as a trial listening to music, a preview of a film, a demonstration of a game, and the like can be provided maintaining high secrecy with their trial periods limited. In this case, much higher data protection is possible if data of the expiration limit of an allowable trial use is encrypted and stored in the protected [0070] area 213 in the SD memory card 21.
  • Described next will be a fourth embodiment of the present invention, which uses the lock/unlock function described above. In the fourth embodiment, a password is obtained through a predetermined procedure with respect to data recorded on the [0071] SD memory card 21. With use of the password, the data recorded on the SD memory card 21 can be used up to a predetermined preset number of times. The fourth embodiment will be described with reference to FIGS. 1, 7, and 9.
  • In the fourth embodiment, data indicative of a preset maximum number of starts the program can be started up is obtained as the access [0072] limit application program 121 starts up (step S21 in FIG. 9). Further, data indicative of another number of starts, i.e., how many times the program 121 has been started up till the current start-up is obtained (step S22). Both of these data items are compared with each other to determine whether the number of starts the program 121 has been started up till the current start-up exceeds the preset maximum number of starts or not (step S23). The data indicative of the maximum number of starts is encrypted and set in advance, for example, in the registry 122 of the main memory 12. This data is read from the registry 122 at the time of start-up, and is obtained by performing a decryption processing. The other data indicative of the number of times the program 121 has been started up till the current start-up can be obtained, for example, by using a particular area of the registry 122 as a start number counter and by incrementing the content of the counter for every start-up of the application. The contents (count value) i.e., of the number of starts may be encrypted and held in the start number counter.
  • If the number of starts till the current start-up exceeds the preset maximum number of starts (Yes in step S[0073] 23), an error message thereof is displayed on the display device 18 (step S26). Then, the access limit application program 121 is taken as causing a start-up error, and the access to the SD memory card 21 is made invalid.
  • If the number of starts till the current start-up does not exceed the preset maximum number of starts (No in step S[0074] 23), the number of start till the current start-up is updated (+1) (step S24). Then, the SD memory card 21 is locked (step S25), and the start-up processing continues.
  • With respect to the locked [0075] SD memory card 21, data recorded on the SD memory card 21 can be used by unlocking the SD memory card 21 with a password (see steps R33 to R36 in FIG. 7).
  • By using this function, various data can be provided maintaining high secrecy and limiting the number of times the data can be used. In this case, much higher data protection is possible if data indicative of the maximum number of allowable uses is encrypted and stored in the protected [0076] area 213 in the SD memory card 21.
  • Described next will be a fifth embodiment of the present invention, which uses the lock function as described above. In the fifth embodiment, use of data recorded on the [0077] SD memory card 21 is allowed only within a preset control-expiration limit. The fifth embodiment will now be described with reference to FIGS. 1 and 10.
  • In the fifth embodiment shown in FIG. 10, data indicative of a preset control-expiration limit (step S[0078] 31) is obtained as the access limit application program 121 starts up. Further, data indicative of the current date/time is obtained (step S32). Both of these data items are compared with each other to determine whether the current date/time is over the preset control-expiration limit or not (step S33). An example of obtaining each data item at this time has already been described in the third embodiment, and therefore, explanation of the example will be omitted.
  • If the current date/time is not over the preset control-expiration limit, i.e., within the control-expiration limit (No in step S[0079] 33), the start-up processing is continued. If the current date/time is over the preset control-expiration limit, i.e., the control-expiration limit has expired (Yes in step S33), the SD memory card 21 is locked (step S34), and an error message thereof is displayed on the display device 18 (step S35). The access to the SD memory card 21 is then made invalid.
  • By using this function of controlling the usable period, various data can be provided maintaining high secrecy. In this case, much higher data protection is possible if data of the expiration limit of the usable period is encrypted and stored in the protected [0080] area 213 in the SD memory card 21.
  • Described next will be a sixth embodiment of the present invention, which uses the lock function described above. In the sixth embodiment, use of the data recorded on the [0081] SD memory card 21 is allowed up to a predetermined preset number of times. The sixth embodiment will be described with reference to FIGS. 1 and 11.
  • In the sixth embodiment, data indicative of a preset maximum number of allowable starts is obtained as the access [0082] limit application program 121 starts up (step S41 in FIG. 11). Further, data indicative of another number of starts, i.e., how many times the program 121 has been started up till the current start-up is obtained (step S42). Both of these data items are compared with each other to determine whether the number of starts till the current start-up exceeds the preset maximum number of allowable starts or not (step S43). An example of obtaining each data item at this time has already been described in the fourth embodiment, and therefore, explanation of the example will be omitted.
  • If the number of starts till the current start-up exceeds the preset maximum number of allowable starts (Yes in step S[0083] 43), the SD memory card 21 is locked (step S45), and an error message indicating that the preset maximum number is exceeded is displayed on the display device 18 (step S46). Then, the access to the SD memory card 21 is made invalid.
  • If the number of starts till the current start-up does not exceed the preset maximum number of allowable starts, the number of starts till the current start-up is updated (+1) (step S[0084] 44), and the start-up processing continues.
  • By using this function of limiting the number of uses, various data can be provided limiting the number of times the data can be used. In this case, much higher data protection is possible if data indicative of the maximum number of allowable uses is encrypted and stored in the protected [0085] area 213 in the SD memory card 21.
  • While the description above refers to particular embodiments of the present invention, it will be understood that many modifications may be made without departing from the spirit thereof. Though the above embodiments teaches that the SD card is unlocked based on one of time data, the number of accesses, and the accessing source, it is possible to modify the embodiments to unlock the SD card based on setting data including one of the time data, the number of accesses, and the accessing source. The accompanying claims are intended to cover such modifications as would fall within the true scope and spirit of the present invention. The presently disclosed embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims, rather than the foregoing description, and all changes that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. [0086]

Claims (12)

What is claimed is:
1. A data processing apparatus comprising:
a mount to which a recording medium having a lock/unlock function is attached;
a determination unit which determines whether the recording medium attached to the mount has the lock/unlock function;
a locking unit which locks the recording medium to protect data recorded on the recording medium; and
an unlocking unit which unlocks the recording medium locked by the locking unit based on a predetermined condition.
2. The apparatus according to claim 1, wherein the unlocking unit unlocks the locked recording medium when a coincidence of a password is detected.
3. The apparatus according to claim 1, wherein the unlocking unit unlocks the locked recording medium according to a condition of a preset access limit.
4. The apparatus according to claim 3, wherein the access limit comprises one of time data, a number of accesses, and an accessing source, or setting data including the one.
5. The apparatus according to claim 1, further comprising an encryption unit which encrypts data to be recorded on the recording medium.
6. The apparatus according to claim 1, wherein the mount detachably attaches a card-like recording medium directly or via an adapter to a body of the apparatus.
7. The apparatus according to claim 6, wherein the recording medium comprises a first firmware program which performs a predetermined authentication procedure, a second firmware program which performs locking and unlocking, a protected area which is accessible when the authentication procedure is successfully completed, and a processor which performs processings of the first and second firmware programs, the processor being linked with the locking unit and the unlocking unit to perform the locking and the unlocking.
8. The apparatus according to claim 7, wherein data indicating the predetermined condition is recorded on the protected area, and the unlocking unit reads the data indicating the predetermined condition from the protected area.
9. A memory card having a lock/unlock function, comprising:
a locking unit which locks the memory card;
an unlocking unit which unlocks the memory card locked by the locking unit;
a memory which stores condition data on which locking or unlocking is performed; and
a controller which limits access to recorded data in the memory card by the locking unit or the unlocking unit based on the condition data stored in the memory.
10. The memory card according to claim 9, further comprising:
an authentication processor which performs an authentication procedure between the memory card and a device using the memory card; and
a protected area which is accessible when the authentication procedure is completed successfully, wherein
the memory stores the condition data in the protected area or in a normal-data recoding area which is not protected.
11. The memory card according to claim 9, wherein the memory stores time data to limit access to the recorded data.
12. The memory card according to claim 9, wherein the memory stores data indicative of a number of times to limit access to the recorded data.
US10/828,239 2003-04-24 2004-04-21 Data processing apparatus and memory card Expired - Fee Related US6990026B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2003120093A JP2004326425A (en) 2003-04-24 2003-04-24 Information processor and memory card
JP2003-120093 2003-04-24

Publications (2)

Publication Number Publication Date
US20040268074A1 true US20040268074A1 (en) 2004-12-30
US6990026B2 US6990026B2 (en) 2006-01-24

Family

ID=32959658

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/828,239 Expired - Fee Related US6990026B2 (en) 2003-04-24 2004-04-21 Data processing apparatus and memory card

Country Status (3)

Country Link
US (1) US6990026B2 (en)
EP (1) EP1471408A3 (en)
JP (1) JP2004326425A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060010328A1 (en) * 2004-07-07 2006-01-12 Sony Corporation Semiconductor integrated circuit and information processing apparatus
US20090013134A1 (en) * 2007-07-06 2009-01-08 Transcend Information , Inc. Memory apparatus and protecting method thereof
US20090055573A1 (en) * 2007-08-22 2009-02-26 Takafumi Ito Semiconductor device connectable to memory card and memory card initialization method
US20100313263A1 (en) * 2007-09-05 2010-12-09 Panasonic Corporation Electronic device, password control method, and program
US20110022850A1 (en) * 2006-07-26 2011-01-27 Hondar Lee Access control for secure portable storage device
US20110225335A1 (en) * 2010-03-15 2011-09-15 International Business Machines Corporation Using a dual mode reader writer lock
US20120194870A1 (en) * 2005-07-25 2012-08-02 Canon Kabushiki Kaisha Image processing apparatus for performing print setting of image data
US20120290776A1 (en) * 2005-05-20 2012-11-15 Stec, Inc. Secure memory devices and methods of managing secure memory devices
CN102831924A (en) * 2012-08-14 2012-12-19 青岛海信宽带多媒体技术有限公司 Control method and control circuit for SD card
US20130326628A1 (en) * 2012-05-31 2013-12-05 Kabushiki Kaisha Toshiba Electronic device
US20150278124A1 (en) * 2005-07-21 2015-10-01 Clevx, Llc Memory lock system with manipulatable input device and method of operation thereof
KR101622416B1 (en) * 2008-04-10 2016-05-18 샌디스크 아이엘 엘티디 Peripheral device locking mechanism
US20180039437A1 (en) * 2016-08-02 2018-02-08 Samsung Electronics Co., Ltd. Method of executing data scrubbing inside a smart storage device
US20190163936A1 (en) * 2017-11-30 2019-05-30 International Business Machines Corporation Software controlled port locking mechanisms
US20230418741A1 (en) * 2022-06-27 2023-12-28 Western Digital Technologies, Inc. Data storage device management system

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101292253A (en) * 2005-10-20 2008-10-22 株式会社Yamato Data file recording system and data file recording method
JP4884822B2 (en) * 2006-04-14 2012-02-29 京セラ株式会社 Portable terminal device and communication control method thereof
JP2008269037A (en) * 2007-04-17 2008-11-06 Hitachi Ltd Information protection system for recording medium
US7753280B1 (en) * 2008-09-03 2010-07-13 Marcus Howard Personal bank card storage device and method of use
JP5319238B2 (en) * 2008-10-29 2013-10-16 真二 栗本 Information processing system, information processing apparatus, information processing method, and information processing program
US9753503B2 (en) 2014-08-14 2017-09-05 Samsung Electronics Co., Ltd. Memory card socket and data processing device including the same

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5361228A (en) * 1992-04-30 1994-11-01 Fuji Photo Film Co., Ltd. IC memory card system having a common data and address bus

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5282247A (en) 1992-11-12 1994-01-25 Maxtor Corporation Apparatus and method for providing data security in a computer system having removable memory
AU1265195A (en) * 1993-12-06 1995-06-27 Telequip Corporation Secure computer memory card
CN100405247C (en) * 1999-03-03 2008-07-23 索尼公司 Data processing device, data processing method, terminal, transmission method for data processing device
JP3389186B2 (en) * 1999-04-27 2003-03-24 松下電器産業株式会社 Semiconductor memory card and reading device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5361228A (en) * 1992-04-30 1994-11-01 Fuji Photo Film Co., Ltd. IC memory card system having a common data and address bus

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7913307B2 (en) * 2004-07-07 2011-03-22 Sony Corporation Semiconductor integrated circuit and information processing apparatus
US20060010328A1 (en) * 2004-07-07 2006-01-12 Sony Corporation Semiconductor integrated circuit and information processing apparatus
US20120290776A1 (en) * 2005-05-20 2012-11-15 Stec, Inc. Secure memory devices and methods of managing secure memory devices
US8850150B2 (en) 2005-05-20 2014-09-30 Stec, Inc. Managing security in solid-state devices
US8677092B2 (en) * 2005-05-20 2014-03-18 Stec, Inc. Secure memory devices and methods of managing secure memory devices
US10083130B2 (en) 2005-07-21 2018-09-25 Clevx, Llc Memory lock system with manipulatable input device and method of operation thereof
US20150278124A1 (en) * 2005-07-21 2015-10-01 Clevx, Llc Memory lock system with manipulatable input device and method of operation thereof
US10025729B2 (en) * 2005-07-21 2018-07-17 Clevx, Llc Memory lock system with manipulatable input device and method of operation thereof
US10503665B2 (en) 2005-07-21 2019-12-10 Clevx, Llc Memory lock system with manipulatable input device and method of operation thereof
US20120194870A1 (en) * 2005-07-25 2012-08-02 Canon Kabushiki Kaisha Image processing apparatus for performing print setting of image data
US20110022850A1 (en) * 2006-07-26 2011-01-27 Hondar Lee Access control for secure portable storage device
US20090013134A1 (en) * 2007-07-06 2009-01-08 Transcend Information , Inc. Memory apparatus and protecting method thereof
US8108591B2 (en) * 2007-08-22 2012-01-31 Kabushiki Kaisha Toshiba Semiconductor device with a first interface to connect to a memory card having a lock and unlock state and a second interface to connect to a host device and memory card intialization method
US20090055573A1 (en) * 2007-08-22 2009-02-26 Takafumi Ito Semiconductor device connectable to memory card and memory card initialization method
US20100313263A1 (en) * 2007-09-05 2010-12-09 Panasonic Corporation Electronic device, password control method, and program
US8887268B2 (en) * 2007-09-05 2014-11-11 Panasonic Intellectual Property Corporation Of America Electronic device, password control method, and program
KR101622416B1 (en) * 2008-04-10 2016-05-18 샌디스크 아이엘 엘티디 Peripheral device locking mechanism
US8166256B2 (en) * 2010-03-15 2012-04-24 International Business Machines Corporation Using a dual mode reader writer lock
US20110225335A1 (en) * 2010-03-15 2011-09-15 International Business Machines Corporation Using a dual mode reader writer lock
US20130326628A1 (en) * 2012-05-31 2013-12-05 Kabushiki Kaisha Toshiba Electronic device
CN102831924A (en) * 2012-08-14 2012-12-19 青岛海信宽带多媒体技术有限公司 Control method and control circuit for SD card
US20180039437A1 (en) * 2016-08-02 2018-02-08 Samsung Electronics Co., Ltd. Method of executing data scrubbing inside a smart storage device
US10824348B2 (en) * 2016-08-02 2020-11-03 Samsung Electronics Co., Ltd. Method of executing conditional data scrubbing inside a smart storage device
US20190163936A1 (en) * 2017-11-30 2019-05-30 International Business Machines Corporation Software controlled port locking mechanisms
US10796029B2 (en) * 2017-11-30 2020-10-06 International Business Machines Corporation Software controlled port locking mechanisms
US20230418741A1 (en) * 2022-06-27 2023-12-28 Western Digital Technologies, Inc. Data storage device management system

Also Published As

Publication number Publication date
JP2004326425A (en) 2004-11-18
US6990026B2 (en) 2006-01-24
EP1471408A3 (en) 2005-12-28
EP1471408A2 (en) 2004-10-27

Similar Documents

Publication Publication Date Title
US6990026B2 (en) Data processing apparatus and memory card
US8302178B2 (en) System and method for a dynamic policies enforced file system for a data storage device
US5623637A (en) Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
EP0561685B1 (en) An electronic data protection system
US7552345B2 (en) Implementation of storing secret information in data storage reader products
JP3774260B2 (en) Memory card security system device and memory card thereof
US8572392B2 (en) Access authentication method, information processing unit, and computer product
TW556160B (en) Revocation information updating method, revocation information updating apparatus and storage medium
TW514845B (en) Data storage regenerator and data storage processing method and program providing media
EP2780855B1 (en) Method and storage device for protecting content
US20040123127A1 (en) System and method for securing portable data
US20080091900A1 (en) Nonvolatile memory device and data processing system
US20080178009A1 (en) Electronic apparatus and information processing method
JP2000353204A (en) Electronic data managing device and method and recording medium
EP1775881A1 (en) Data management method, program thereof, and program recording medium
JP2005316284A (en) Portable terminal and data security system
US20030145182A1 (en) Data storage apparatus, data storing method, data verification apparatus, data access permission apparatus, and program and storage medium therefor
EP1017223A2 (en) System for authenticating digital data
JP2008511088A (en) Protected access to data storage media with mass memory and chips
KR100750697B1 (en) Digital document preservation system having a share memory for user access function and document transaction method used the system
US7299366B2 (en) Secure software customization for smartcard
JP2006172351A (en) Method and system for content expiration date management by use of removable medium
JP2003076611A (en) Memory card having security function
EP0624267B1 (en) Method and device for preventing unauthorised access to a computer system
JP2009211487A (en) Information processor, information processing system and program

Legal Events

Date Code Title Description
AS Assignment

Owner name: KABUSHIKI KAISHA TOSHIBA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAGI, HIDEKI;REEL/FRAME:015744/0718

Effective date: 20040528

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20100124